Professional Documents
Culture Documents
1 Introduction
Wireless networking technologies are rapidly evolving. Apart from the growth
of such apparent indices as capacity or throughput, wireless networks become
more intelligent: self-organization, robustness, and parameterized QoS support
for real-time multimedia traffic are today’s issues. Another evidence of this evo-
lution is the expansion of wireless technologies to those scenarios which the
technologies were not initially intended for, e.g. the increase of Wi-Fi network
coverage area by means of multihop operation or the usage of LTE femtocells as
local area networks.
Understanding the trends in the wireless networking market, IEEE 802.11
standards committee paid attention to self-organizing multihop networks and
developed the IEEE 802.11s standard [1] defining Wi-Fi Mesh which seems to
be a promising technology to expand the coverage area of wireless local area
networks (WLANs) and to increase their robustness. The standard is more than
just a routing framework. It defines a novel deterministic channel access method
A B
one-hop D
two-hop C
1. The routing protocol, e.g. developed in [5], has found a stable path between
the source and destination stations.
2. The end-to-end QoS requirements (PLR and delay) are divided among all
hops in the path, e.g. according to the strategy presented in [6].
time
1. As the use of the resource reservation scheme proposed in Section 2.2 and
shown in Fig. 2 leads to meeting the delay requirement, our goal is to develop
a method which allows to meet the PLR requirement. PLR may change over
time, so we consider a series of time intervals of fixed duration and measure
PLR for each interval I as the number of lost packets (LI ) divided by the
number of sent packets WI (which is constant for a CBR stream: WI ≡ W )
during interval I. At first sight, the PLR requirement may be written as
LI QoS
W ≤ P LR , but the wireless channel unpredictably changes over time.
Adjusted to meet the PLR requirement with current channel conditions, the
method may violate it after the conditions change. So, strictly speaking, the
PLR requirement should be rewritten as
LI QoS
P ≤ P LR ≥ α, (1)
W
where P{A} is the probability of event A and confidence α is close to 1, say
0.95.
2. Providing QoS support, the proposed method shall consume as few channel
resources as possible. Taking into consideration that channel resource con-
sumption of two-hop protection is higher than that of one-hop protection, we
assign various costs to the reservations with different protection types. Let
the cost of a reservation with two-hop protection be cth times higher than
the cost of a reservation with one-hop protection. For example, cth may equal
the ratio of the number of stations in two-hop neighborhood to the number
of stations in one-hop neighborhood of transmitter and receiver. We obtain
that among all sets of reservations which allow to satisfy (1), the method
shall select the set of the lowest possible cost.
3. Finally, we shall take into consideration that the method shall not fluctu-
ate, i.e. shall not establish or release reservations too frequently, since every
change in the set of reservations increases overhead and may take some time.
Indeed, to establish a new reservation, the stations run a negotiation pro-
cedure and then advertise the established reservation. It takes some time
tsetup which is about the beacon interval. When a station releases an ex-
isting reservation, its neighbors become aware of this action after the next
advertisement. So, actually, the resources are released only after tsetup .
3 Proposed method
As described in Section 2.2, the number of reservations (i.e. the number of packet
transmission attempts) needed to meet QoS requirements for each particular
stream depends on the channel conditions, which may significantly vary over
time. So, the key idea of the proposed method consists in the periodical running
of the procedure which considers the current set of reservations, estimates chan-
nel conditions, and, if needed, adds or removes some reservations, forming the
new set. The procedure consists of three steps.
At the first step, we describe the transmission of the stream by a statistical
model which allows to find the probability that an arbitrary packet of the stream
will be successfully transmitted with set R of reservations as function Pθ (R)
with parameter θ corresponding to current channel conditions. In Section 3.2,
we present an example of the statistical model. However, other models may also
be used. We use the statistics of all transmission attempts in the current set
Rcur of reservations for the last h packets to tune the model. In other words, we
find θ = θ̂ which optimally describes channel conditions, using the maximum-
likelyhood approach [16].
At the second step, we use the model to find the cheapest set R∗ of reser-
vations meeting the PLR requirement. To check if it is met for set R, we find
the probability that for W packets the number of lost packets is less or equal to
bW · P LRQoS c. Assuming that transmissions of various packets are statistically
independent, we obtain that this probability equals FW,1−Pθ̂ (R) (bW · P LRQoS c),
where
k
X W!
FW,1−Pθ̂ (R) (k) = (1 − Pθ̂ (R))i Pθ̂ (R)W −i
i=0
(W − i)! i!
At the third step, taking recommended set R∗ and the statistics for current
set Rcur into account, we form a new set Rnew of reservations to be used further.
Actually, Rnew may differ from both R∗ and Rcur .
The described above procedure is run periodically. The time interval between
two executions of the procedure depends on packet interarrival time T and the
result of the previous execution. If no reservations were added, next time the
procedure is run after τ packets are sent, τ ≤ h. If one or several reservations
were added, it is necessary to establish them, which takes tsetup , and then to
obtain statistics for new reservations, which requires h packets to be sent via the
t
new reservations. If T is constant, the procedure is run after τ 0 = d setup
T e+h
packets are sent.
To describe the procedure in detail, let us start with the case when all reser-
vations are of the same cost, e.g. only one-hop protection is used for all reser-
vations. For this case, we develop a basic procedure described in Section 3.2
and two enhancements of its third step which improve QoS support and reduce
fluctuation (see Sections 3.3 and 3.4, respectively). These enhancements may be
used separately or together. We consider the complex case with reservations of
various costs in Section 3.5.
At the first step, we tune the statistical model. We develop the model, based on
the following ideas:
where X is the binary matrix of r rows and h columns, Xij = 1 if the transmission
of packet j via reservation i was successful.
We estimate pi0 for a new reservation i0 > r as the mean value of pˆi :
r
1X
p̂i0 = pˆi . (4)
r i=1
At the second step, we use the model to obtain the cheapest set R∗ of reser-
vations which allows to meet the PLR requirement. For that, if requirement (2)
is not met for the current set Rcur , we add new reservations one by one until
(2) holds. Otherwise, we remove the reservations with the lowest pi one by one
until removing of the reservation breaks (2).
At the third step, we merely follow the statistical model recommendation and
choose Rnew ← R∗ . Such a simple step of the basic procedure is enhanced below.
C→D
This example shows that the statistical model may overestimate Pθ̂ (R), which
means that choosing Rnew = R∗ may violate the PLR requirement (2). Taking
this fact into account, we develop an enhancement of the third step: we check if
the use of set R∗ given by the statistical model may violate the PLR requirement
and adjust the set if needed.
To
Q check if the use of set R violates the PLR requirement, we consider δR (j) =
1− (1−Xij ), which is the indicator that the j-th packet has been successfully
i∈R
transmitted by at least one of the reservations from set R. Then we calculate
the successful packet transmission probability for reservation set R as
h
1X
Pδ (R) = δR (j). (6)
h j=1
This estimate is more accurate than (5) and may be used instead of it:
However, (6) is undefined for R * Rcur , and, in this case, we obey the recom-
mendation of the statistical model: Rnew ← R∗ .
Otherwise, i.e. if R∗ ⊆ Rcur , we form Rnew as follows.
– If PLR requirement (7) is not met for the current set Rcur , we need to
establish more reservations. R∗ ⊆ Rcur means that the statistical model
does not increase the number of reservations, because it overestimates the
probability of successful packet transmission. So, we ignore recommendation
R∗ and establish an additional reservation: Rnew = Rcur ∪ i0 .
– Otherwise, i.e. if PLR requirement (7) is met for current set Rcur , it may be
possible to reduce the number of reservations. Starting from R = Rcur , we
remove reservations from R one by one until |R|= |R∗ | or further removal
of reservations breaks PLR requirement (7). Each time we select the worst
reservation as the candidate to be removed from given set R, i.e. we select
reservation i = iw which maximizes value Pδ (R \ {i}).
In this Section, we extend the procedure to select the appropriate type of protec-
tion. For this purpose, we consider separately sets Roh and Rth of reservations
with one-hop and two-hop protection, and then apply ideas discussed in Sec-
tions 3.1 – 3.4.
The first step of the procedure is the same as in Section 3.2 except for (4).
Namely, we estimate pi0 for a new reservation i0 of type y considering only the
existing reservations of the same type Rycur ⊂ Rcur :
1 X
p̂i0 = pˆi . (8)
|Rycur | cur
i∈Ry
– Consider the case when (7) is not met for the current set Rcur . In this
case, the procedure should establish new reservations but should not release
existing ones. It is performed as follows.
1. If the statistical model recommends to add at least one reservation, we
add it without removing existing ones.
2. Otherwise, i.e. if model does not recommend to add reservations, we
consider that the model fails and add a new reservation. The type of
this reservation is selected as follows.
Let p̂oh0 and p̂th0 be estimates (8) for new reservations with one-hop
and two-hop protection, respectively. Assuming that errors are not cor-
related, we can estimate the least number κ of reservations with one-hop
protection that provide the same or less PLR as compared to one reserva-
tion with two-hop protection: (1 − p̂oh0 )κ ≤ (1 − p̂th0 ). If κ > cth then we
select two-hop protection for the new reservation. Otherwise, we choose
one-hop protection.
– Now consider the case when PLR requirement (7) is met for the current
set Rcur . The model may recommend to add new reservations, to release
existing reservations, or both to add reservations of one type and to release
reservations of another type.
1. If the model recommends only to add some reservations, we follow this
recommendation.
2. If the model recommends only to release reservations of the same type
or of different types, we try to release these reservations greedily one by
one, while PLR requirement (7) is met. As reservations differ by both
quality and cost, each time we select the reservation with the smallest
net utility uR (i):
Pδ (R) − Pδ (R \ {i})
uR (i) = , (9)
ci
where ci is the cost of reservation i. For reservations with one-hop pro-
tection it equals coh = 1, and for reservations with two-hop protection
it equals cth .
3. If the model recommends to remove reservations of one type and to add
reservations of the other type, we, first, try to release reservations of the
first type while PLR requirement (7) is met and then add reservations
of the second type.
4 Performance evaluation
2. Mean Cost of the Reservation set (MCR), which is the sum of the mean
number of reservations with one-hop protection and two-hop protection in
Rcur weighted by their costs coh and cth ;
0.15
Tchange = 2500
2.65
Tchange = 5000 7FKDQJH
Tchange = 50000 7FKDQJH
2.60
●
●
0.10
2.55
● ●
● ●
●
MCR
QVR
●
●
2.50
● ●
● ●
●
● ●
● ● ●
0.05
2.45
●
● ● ●
2.40
2.35
0.00
0 200 400 600 800 1000 1200 0 200 400 600 800 1000 1200
h h
● 7FKDQJH
7FKDQJH
●
7FKDQJH
0.15
7FKDQJH
0.10
FA, 10−3
●
0.05
●
● ● ● ● ● ● ● ● ● ●
0.00
0.3
Enhanced−20 Enhanced−20
10
●
● ● ● ● ●
● ● ● ● ●
●
0.2
MCR
QVR
8
0.1
6
● ● ● ● ● ● ● ●
●
●
●
●
●
0.0
4
0 200 400 600 800 1000 1200 0 200 400 600 800 1000 1200
h h
● Basic
Enhanced−1
0.4
Enhanced−5
Enhanced−10
Enhanced−20
●
0.3
FA, 10−3
0.2
●
0.1
●
●
●
●
● ● ● ● ● ●
0.0
Fig. 5. Results of experiments for different procedures with and without enhance-
ments, τ =50
reduce fluctuation and, eventually, to meet the PLR requirement. However, too
high values of l increase resource consumption, as they introduce an additional
delay before removing reservations. So, to meet the PLR requirement, both en-
hancements should be used, while the actual value of l should be chosen, de-
pending on τ and h values. For example, in the considered scenario with τ = 50
and h = 300, we can choose l = 10.
A B
Fig. 6. Network scenario considered in Section 4.4.
(one-hop or two-hop) for the established reservations, taking into account the
current channel conditions.
To obtain more tractable results and to evaluate the efficiency of the adaptive
procedure, let us consider a simpler scenario than in Section 4.3, shown in Fig.
6. As before, during the ns-3 experiment station A transmits a voice stream to
station B with a fixed number of reservations with either one-hop or two-hop
protection. Station C periodically (with a fixed period T0 ) starts transmission of
saturated EDCA traffic to station D (e.g., initiates a TCP session) which lasts
for σT0 , σ ∈ [0, 1]. The transmission of station C causes interference at station B.
Also during the whole experiment packet transmissions are affected by random
noise of a fixed level. Summing up, packet transmissions between stations A and
B are affected by both random noise and interference from station C during σT0
subinterval, and by random noise only during (1 − σ)T0 subinterval.
In the scenario described above, we compare the efficiency of our method
when for the established reservations the protection type is: i) only one-hop, ii)
only two-hop, iii) chosen adaptively, as defined in Section 3.5. The results are
presented in Fig.7. As the PLR requirement is always met and the fluctuation
is relatively low for all σ values, we omit QV R and F A plots.
Let us explain the obtained results. When transmissions in the established
reservations are affected by random noise only (σ = 0), the average number
of reservations established by our method is 1.6 regardless of the used type of
protection (one-hop or two-hop). However, the cost of reservations with two-hop
protection is 4 times greater than that with one-hop, so it is inefficient to use
two-hop protection in this case.
When reservations are affected by both random noise and interference (σ =
1), the usage of only one-hop protection leads to high resource consumption, as
the probability of successful transmission in reservations with one-hop protection
is very low. Two-hop protection allows to eliminate interference, so the average
number of reservations with two-hop protection established by our method is
the same as in case of σ = 0.
With adaptive selection of protection type in case of σ = 1, our method on
average establishes 1 reservation with two-hop protection and 1.3 reservations
with one-hop protection, which results in a lower cost comparing with non-
adaptive schemes. Moreover, for all σ values adaptive selection of protection type
● one−hop
two−hop
adaptive
10
●
8
●
MCR
6
●
●
2
sigma
5 Conclusion
The method proposed in this paper allows to use MCCA for streaming real-time
multimedia data with parameterized QoS support in presence of random noise
and interference dynamically changing over time. Numerous experiments show
that the method is robust in a vast range of scenarios. Apart from providing
QoS support, the method minimizes channel resource consumption, taking into
account the dynamic properties of the channel inherent to the real-life Wi-Fi
Mesh networks, which, in turn, increases network capacity. It worth to note
that the proposed method can be also applied with other technologies which use
deterministic access methods to reserve channel resources, e.g. with ECMA 368
DRP.
Although the presented method is developed for the case of transmission of
CBR streams, it can be extended for VBR streams (e.g. real-time video stream-
ing). For that, in addition to estimation of channel conditions the statistical
model should be able to estimate the incoming packet rate. This will be the
direction of our future research.
Acknowledgement
The reported study was partially supported by the Ministry of education and
science of Russian Federation, (research project No. 8766), by RFBR (research
project No. 12-07-33067 mol a ved) and by FP7 FLAVIA project (No. FP7-
257263).
References
1. IEEE 802.11s-2011: IEEE Standard for Information technology – Telecommunica-
tions and information exchange between systems -– Local and metropolitan area
networks — Specific requirements — Part 11: Wireless LAN Medium Access Con-
trol (MAC) and Physical Layer (PHY) specifications Amendment: Mesh Network-
ing, 2011
2. Lyakhov A., Pustogarov I., Safonov A., and Yakimov M.: Starvation effect study in
IEEE 802.11 mesh networks. In Proceedings of Third IEEE International Work-
shop on Enabling Technologies and Standards for Wireless Mesh Networking
(MeshTech’09), Macao SAR, P.R. China (2009)
3. C. Cicconetti, L. Lenzini, E. Mingozzi: Scheduling and Dynamic Relocation for IEEE
802.11s Mesh Deterministic Access. In Proceedings of 5th Annual IEEE Commu-
nications Society Conference on Sensor, Mesh and Ad Hoc Communications and
Networks (SECON’08), 19–27, California, USA (2008)
4. A. Krasilov, A. Lyakhov, A. Safonov: Interference, even with MCCA channel access
method in IEEE 802.11s mesh networks. In Proceedings of IEEE Eighth Interna-
tional Conference on Mobile Ad-Hoc and Sensor Systems (MASS’2011), 752–757.
Valencia, Spain (2011)
5. E. Khorov, A. Lyakhov, A. Safonov: Flexibility of Routing Framework Architecture
in IEEE 802.11 s Mesh Networks. In Proceedings of IEEE Eighth International Con-
ference on Mobile Ad-Hoc and Sensor Systems (MASS’2011), 777—782. Valencia,
Spain (2011)
6. E. Shvets, A. Lyakhov: Mathematical model of MCCA-based streaming process in
mesh networks in the presence of noise. In Proceedings of Wireless Communications
and Networking Conference (WCNC’2012), 1887–1892 (2012)
7. X. Yu, P. Navaratnam, K. Moessner: Resource Reservation Schemes for IEEE
802.11-Based Wireless Networks: A Survey. IEEE Communications Surveys & Tu-
torials, Issue 99, 1–20 (2012)
8. ECMA: High Rate Ultra Wideband PHY and MAC Standard, ECMA-368, Decem-
ber 2007
9. IEEE 802.11-2007: IEEE Standard for Information technology – Telecommunica-
tions and information exchange between systems – Local and metropolitan area
networks – Specific requirements – Part 11: Wireless LAN Medium Access Control
(MAC) and Physical Layer (PHY) Specifications, 2007
10. G. Boggia, P. Camarda, L. Grieco, S. Mascolo: Feedback-Based Control for Pro-
viding Real-Time Services With the 802.11e MAC. IEEE/ACM Transactions on
Networking, vol. 15, no. 2, 323–333 (2007)
11. D. Skyrianoglou, N. Passas, and A.K. Salkintzis: ARROW: An Efficient Traffic
Scheduling Algorithm for IEEE 802.11e HCCA. IEEE Transactions on Wireless
Communications, vol. 5, no. 12, 3558–3567 (2006)
12. W.-K. Kuo, C.-Y. Wu: Supporting Real-Time VBR Video Transport on WiMedia-
Based Wireless Personal Area Networks. IEEE Transactions on Vehicular Technol-
ogy, vol. 58, issue 4, 1965–1971 (2009)
13. M. Daneshi J. Pan, S. Ganti: Towards an Efficient Reservation Algorithm for Dis-
tributed Reservation Protocols. In Proceedings of the 29th conference on Informa-
tion communications (INFOCOM’10), 1855–1863 (2010)
14. E. Shvets, A. Lyakhov, A. Safonov, and E. Khorov: Analytical model of IEEE
802.11s MCCA-based streaming in the presence of noise. SIGMETRICS Perform.
Eval. Rev. 39, 2, September 2011, 38–40
15. FLAVIA: FLexible Architecture for Virtualizable future wireless Internet Access,
FP7 research project. [Online]: http://www.ict-flavia.eu/
16. I.A. Ibragimov: Maximum-likelihood method. Encyclopedia of Mathematics. ISBN
1-4020-0198-3
17. The ns-3 network simulator. [Online]: http://www.nsnam.org/
18. ITU-T: Recommendation G.729 Coding of speech at 8 kbit/s using conjugate-
structure algebraic-code-excited linear prediction (CSACELP). Tech. rep., January
2007
19. The R Project for Statistical Computing. [Online]: http://www.r-project.org/